PinnedAnalysis of Cisco Attack and Cyber Kill ChainOn August 10, 2022, Cisco Talos Intelligence disclosed a successful cyber-attack which appears to be a targeted attack that resulted in…Aug 31, 2022Aug 31, 2022
Best Tools for Personal Security and PrivacyIn today’s digital age, maintaining complete anonymity seems almost impossible unless you’re prepared to live off the grid with no human…Nov 7, 2023Nov 7, 2023
Manual Analysis of Malicious Office Files (No Tools Required!)Together, let’s explore something fascinating today. If you’ve ever opened a Word, Excel, or PowerPoint file, you might be familiar with…Sep 20, 20231Sep 20, 20231
How to Shrink a 300MB Malware to 3MB in 30 Seconds?Imagine yourself as a Tier 1 analyst in a security operations center for a company. Your responsibility is to ensure the business remains…Sep 16, 20231Sep 16, 20231